The Arch Linux team has once again been forced to respond to a distributed denial-of-service attack targeting its AUR repository infrastructure. As a result, DDoS protection has been enabled for aur.archlinux.org to help mitigate the ongoing disruption.

While this measure helps keep the AUR website accessible, it has introduced a significant side effect: pushing to the AUR is currently not possible.

  • beerclue@lemmy.world
    link
    fedilink
    arrow-up
    13
    ·
    4 days ago

    But… why? I mean, who’s targeting Arch? Sounds like the Arch team has some info that they won’t release (for now), but this is so confusing to me…

      • teawrecks@sopuli.xyz
        link
        fedilink
        arrow-up
        2
        ·
        3 days ago

        If it’s blocking AUR updates, it could be an attempt to keep some patches to certain exploits from going out? But it seems unlikely that the cost of a ddos is worth the tiny number of possibly vulnerable AUR users out there…

      • Fecundpossum@lemmy.world
        link
        fedilink
        English
        arrow-up
        7
        arrow-down
        1
        ·
        4 days ago

        I wonder if it could be a state actor? I can imagine that the powers that be in MANY countries could be motivated to keep users away from operating system software that isn’t spyware.

        • Laser@feddit.org
          link
          fedilink
          arrow-up
          13
          ·
          4 days ago

          Then why go against the AUR and not the official mirrors? The former isn’t always exactly the epitome of securely packaged trusted applications

          • Fecundpossum@lemmy.world
            link
            fedilink
            English
            arrow-up
            5
            ·
            4 days ago

            Just spitballing, because honestly the amount of effort that must go into sustaining this attack in the long term just baffles me. Like, why?

    • lengau@midwest.social
      link
      fedilink
      arrow-up
      3
      ·
      4 days ago

      Services I know that have both HTTPS and SSH access have seen all sorts of weird stuff seemingly related to LLM bot scraping over the past few months. Enough to bring down some git servers.

  • gusgalarnyk@lemmy.world
    link
    fedilink
    arrow-up
    5
    ·
    4 days ago

    Is there anything we can do? Like, pardon my lack of knowledge on the subject, but could I host like a mirror and therefore expand the servers… width (would that be the right word)? That way the bots have to hit even more end points?

    • mushroommunk@lemmy.today
      link
      fedilink
      arrow-up
      6
      ·
      4 days ago

      You could donate to the project but I don’t think a mirror would help.

      Mirrors still see a specific instance as the truth and sync to that. A mirror would make it possible for someone to download an update from you while the truth instance is down (or always from you if you’re closer and faster) but without that first truth instance there’ll be no new updates. There won’t be syncing across mirrors. And it wouldn’t really impact any DDOS because it’s still that first instance being targeted.

      DDOS mitigation can take one of two main ways. Add enough server power to overcome the DDOS, this is insanely expensive and out of each for most all but like Amazon and Meta. The second is to cut off whatever is doing the DDOS, either by disabling the specifically protocol or endpoint being used or not allowing certain IPs to connect. These are probably what they are doing already and there’s not much you can do as an outsider to help with this either sadly.

      • gusgalarnyk@lemmy.world
        link
        fedilink
        arrow-up
        2
        ·
        4 days ago

        I already donate but I’ll review my contribution and see if I can throw a few more euros their way.

        Thanks for the explanation on truth in terms of mirrors, that helps me understand. I was offering server power but that might not be feasible or meaningful. And based on what you’ve said, it seems like the Disable focused warfare is the best approach.